Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 15:07

General

  • Target

    9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe

  • Size

    180KB

  • MD5

    9576ced894b1306bb46ea64e5e3cc1b3

  • SHA1

    b0aedd64fd52a19d80df3381df1d3a2ff0fef3e9

  • SHA256

    bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304

  • SHA512

    a9caa0e61e5c356ef79bff9223e1db1a0a6d40690d7b59a601230c0aa2434bba90dbb7035d9e0d90ba9339e6ab79826d40f5c576c77288252119b6f40936c275

  • SSDEEP

    3072:KEVm8FDMBRQW578SzOKdImBUdkDnnzUn0e4TZAQEjaPHEG4hJo5kLctnYZst6AZe:1NJMrdJ5dImBKckD4TKaPE3C5kLctnYn

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 5 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe startC:\Program Files (x86)\LP\D046\F88.exe%C:\Program Files (x86)\LP\D046
      2⤵
        PID:3148
      • C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\6D433\6F8D0.exe%C:\Users\Admin\AppData\Roaming\6D433
        2⤵
          PID:3264

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\6D433\3298.D43

        Filesize

        996B

        MD5

        c89d38796410a35be61b7fcff92b929b

        SHA1

        ef02098c60d3ece47ca321d1143d2c3a36d7c650

        SHA256

        ec6480d75abefaf2b93318347d6d617f40b678d7153e26ffb1d44f07331df316

        SHA512

        2871ced159199a662b75545bf3f2f685e949427b1b2b3041d06c6d6018c21f31f30207c7df568eea56aa9367ba287d7d6c522aa09c7ee429048aedee4f2123a3

      • C:\Users\Admin\AppData\Roaming\6D433\3298.D43

        Filesize

        600B

        MD5

        02322ada5825acc8053a31ddfc9cfd5d

        SHA1

        9af94d69a584ea6ef971d5bff98c23ad509aa466

        SHA256

        e8730069e7e4015e6630ad8039d7438a0988ec791b3e4812fe9806de90a8fb7f

        SHA512

        24926b6b672067691f26aab4376cbea297a2529fd24ad7005cbc81c43e70ef33148d84248e1ddde703f3c81b909121e5e6947624b05a6bb3818eca98ccd965f2

      • C:\Users\Admin\AppData\Roaming\6D433\3298.D43

        Filesize

        1KB

        MD5

        84ad327464163ee74cb70d50c1d20aa7

        SHA1

        6ef3711554eb66e59f4f4ae00551c492301b4260

        SHA256

        beee7d8ac28f31beae33cb00de1d7e3e6bf18639194bcc5fe98c71153ff0e6be

        SHA512

        a5551b6a915818ef0c85144cb1184da46b9dbc1f5abdac001430a5c54bbada862995ea0a0d3478225fbf631c19c7a331daf5ce3af2ab2f3351e8b5e6b2695bcb

      • memory/3148-13-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3148-15-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3264-136-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/3264-135-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4228-17-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/4228-16-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4228-0-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4228-3-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/4228-2-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/4228-287-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB